Spectre, Meltdown researchers unveil 7 more speculative execution attacks

Enlarge (credit: Aurich Lawson / Getty Images) Back at the start of the year, a set of attacks that leveraged the speculative execution capabilities of modern high-performance processors was revealed. The attacks were named Meltdown and Spectre. Since then, numerous variants of these attacks have been devised. In tandem, a range of mitigation techniques has […]

Researchers find Apple MDM can be brute-forced to register rogue devices

Enlarge (credit: Getty Images) Mobile device management (MDM) systems are often used by organizations to manage the security of employees’ devices. But security researchers have found that the interface provided by Apple to enroll Apple devices in an MDM system can also be used to potentially introduce rogue devices into those systems and gain trusted […]

A group of researchers showed how a Tesla Model S can be hacked and stolen in seconds using only $600 worth of equipment (TSLA)

Alphr Researchers from KU Leuven university in Belgium demonstrated that hackers can secretly clone the key fob of a Tesla Model S and steal the car within seconds — and with only $ 600 worth of simple computing and radio equipment, WIRED reports. The researchers brought their findings to Tesla — which rewarded them for exposing […]